Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
CREDAL: Towards locating a memory corruption vulnerability with your core dump
Jun Xu
, Dongliang Mu
, Ping Chen
, Xinyu Xing
, Pei Wang
,
Peng Liu
College of Information Sciences and Technology
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
46
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'CREDAL: Towards locating a memory corruption vulnerability with your core dump'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Debugging Information
50%
Debugging Tool
50%
Offensive Security
50%
Perform Analysis
50%
software debugging
50%
Keyphrases
Automatic Debugging
11%
Core Dumps
100%
Data Corruption
11%
Debug Information
11%
Debugging Aids
11%
Debugging Tools
11%
Offensive Security
11%
Point Frame
11%
Software Debugging
11%
Stack Frame
22%
Stack Trace
33%